Menu

April 16, 2012

#Android Security LegionJJ Anonymous Iberoamerica

First you will want to start your phone to allow root access to a handful of applications that we will be talking in this guide. You can find tutorials on how to do this looking for a way to root your phone model on Google.

With the roots of your phone and overclock your phone, or add new ROMs to further customize or by phone or get better performance, but for this guide is to be used only for the safety of the entire system.

Before the following:

Backup everything that is not saved in your Google Profile. You can check your Gmail contact list at gmail.com to see if your contacts are backed up. Also look at the settings to confirm that your media (images, videos and music [If you are not using Google Music would be a good time to join him music.google.com /]) The process of rooting your phone will result in the deletion of all data. Payment applications can be redownloaded after signing in your Google profile.

Always encrypt first:

The sandwich stock of gingerbread and vanilla ice cream, Google has given an option to encrypt all the phone with a four-pin or password. I highly recommend using a password composed of uppercase and lowercase letters, numbers, punctuation marks and symbols that is easy to remember for yourself, but it seems random. A sample password: LW0 (1b * E (V

Path to encrypt the phone in action gingerbread and vanilla ice cream sandwich:

Settings> Security> Encryption phone. This process takes about an hour, you must be logged in and have your PIN or password has been done to even begin. You can find this option whenever you change your lock screen. The sandwich stock of gingerbread and vanilla ice cream you can find this in Settings> Security> Lock screen.

If your operator or manufacturer, for whatever reason, such as disabled this option with a cover (as MOTOBLUR Motorola, Samsung TouchWiz, Sprint ID or some Android phones Sprint) to install a new ROM that offers this option. You can easily find ROMs available and how to install it on your phone through Google.

The first wave of shock after root:

After his appearance rooted phone for root application. It looks like a gray skull and bones, but with a head of Android. If you see this you have access to the root and proceed with downloading the following applications, if you have this then you will have to try to get root again with the tutorial I had found.

(We will use long URLs in this guide to be transparent with the links are pointing and showing that it is not tracking code in the links)

Download:

Rom Mod Manager by mechanical -

Titanium Backup:

(Optional) Backup Pro Titanium Key:

Use Mod Manager Rom mechanics to back up your stock rom so if you ever want to return to the rom. This is important if you ever want to uproot the phone. After doing this backup titanium use to schedule backups on your phone. In the settings you can raise levels of encryption and storage of encrypted files on DropBox and if you lose your phone.

Second wave of shock after root:

In the next wave of downloads will protect your data connection at the grassroots level using Tor and Google Open DNS. Like the web version of Tor, you will see a slower response time for any use of data, since Tor is working.

Download:

Orbot: Tor on Android -

Orweb: Proxy + Browser Privacy -

Set DNS:

First open Orbot: Tor on Android and follow the instructions to allow root access then you have coverage throughout the system. Next open set DNS and make sure you are using Google Open DNS DNS or anything else that you feel comfortable using. After you're done with that, open a link in Twitter or anther web-based application and you will see a system that prompts the browser to use. For optimum security you can set the Orweb: Proxy + Browser privacy as your default browser at this point.

Affils

Visitors

Notice!

Warning: all institutions, including local, state, federal,and international law enforcement agencies using this site or its associated sites for projects and/or investigations.

- You do not have my permission to use any of my profile information, pictures videos, in any form or forum both current and future.

If you have, or do, it will be considered a violation of my privacy and will be subject to legal action.

Warning: all institutions, including local, state, federal, and international law enforcement agencies using this site or its associated sites for projects and/or investigations.

- You do not have my permission to use any of my profile information, pictures videos, in any form or forum both current and future. If you have, or do, it will be considered a violation of my privacy and will be subject to legal action.

This site provides the information being witheld or manipulated by the controlled media corporations that work in line with those who pull the hidden strings. Understand the true nature of the world around you, the system and exactly how it's controlled.

Article 19 of the Universal Declaration of Human Rights, adopted 1948, states that:

"Everyone has the right to freedom of opinion and expression; THIS RIGHT

INCLUDES FREEDOM TO HOLD OPINIONS WITHOUT INTERFERENCE AND TO SEEK, RECEIVE AND IMPART INFORMATION AND IDEAS THROUGH ANY MEDIA AND REGARDLESS OF FRONTIERS." THROUGH THE INTERNET OR THROUGH ART FORMS, THE PROTECTION OF FREEDOM OF SPEECH AS A RIGHTINCLUDES NOT ONLY THE﻿ CONTENT, BUT ALSO THE MEANS OF EXPRESSION.